Establishing the technical and operational foundation (e.g., synthetic IDs, compromised logins, spoofed websites) to support the fraud scheme. Criminals are preparing malicious domains, forging user accounts, or acquiring stolen credentials.
Examples:
Setting up fraudulent merchant accounts or fake business websites.
Creating synthetic identities or fake employee profiles.
Deploying phishing sites or malware-distribution networks.